+1(316)4441378

+44-141-628-6690

Archive for the ‘Computer science’ Category

Intro to Computers

Business Consulting

Remember Bill? He was the gentleman that you helped to start up his business in Lesson 4. Well his business is doing well, but he has come to you with some questions and concerns. You discuss each of these with Bill and promise to send him a written report with your suggestions and recommendations. Bills questions and concerns are as follows:

Bill has set up a spreadsheet in Excel that will help him keep track of expenses. So far, he has this:



Tell Bill how to do the following tasks:
What formula or function does he put in Column F that will show the total expenses for each day?
What formula or function does he put in columns B through F in Row 13 that will give him the total expenses for the week in each category?
Bill wants the entry in Column G to remind him of expenses that require receipts for the accountant. Tell Bill what to put in Column G to do this:
Print the word Yes in any row where the total daily expenses are gr

Remote Access Policy

Each group member will choose an element of the policy to design, and the group will collaborate on what the overall design and outline should look like and include components from end-user behavior, a training plan, file and folder access, social engineering safeguards, bring-your-own-device policies, use of external drives on company assets, security hardware, penetration testing, and affiliation of the information security department with law enforcement agencies.
MY SPECIFIC POLICY IS "REMOTE ACCESS POLICY"

To keep the scope narrow, your group should first describe what should be included and what should not be included in the policy (remember that a policy should clearly set management's expectations).
After the scope has been defined, research the various components, and create an appropriate policy.
Prepare a Word document of 2-3 pages (excluding title page, abstract, and references page) that includes the network security policy for an organization that address

Usability

Watch videos of 3 participants in a usability study and take notes about:

whether or not the participants are successful
how much time they take to complete a task
what problems they have when completing the task
Write a brief report of the results of the study, usability findings, and recommendations for re-design on the discussion board. Respond to the findings from 2 other classmates, did you find the same things, would you add anything to their findings and recommendations?

Participant videos: https://docs.google.com/document/d/10pkfJfMfAv3cnpVdx-L8snZrCd1vueq0iWCiad0-tBY/edit?

Finishing MyPaper and creating Jupyter Notebook

Here is the Intro and work related sections COMPLETED ( see MyPaper attached). Please finish the rest of the sections so it looks like the sample( See PAPER SAMPLE attached as a reference).


In order to do this: You must create a Jupyter Notebook with detailed comments of why you did what you did with each coding block. See Coding Example attached of similar dataset with different research objectives at the links below:

https://github.com/mrinmaisharma/Online-Retail-Dataset/blob/master/script.ipynb

https://github.com/scheckley/online-retail/blob/master/analysis.ipynb

Note: I want mine to be as simple as possible. I want it just enough to fulfill the research paper objective. Hopefully shows choosing the optimal model out of couple of models.



My research topic:

Using transactions data and machine learning model to predict what a customer is going to purchase on their next visit to the store. This is done using point of sale data (sa

Thoroughly answer the following questions; 1. Not all security experts agree about the value of biometrics. What are the advantages and disadvantages of biometrics? What concerns should privacy advocates have about biometrics? Do you agree or disagree w

Thoroughly answer the following questions;


1. Not all security experts agree about the value of biometrics. What are the advantages and disadvantages of biometrics? What concerns should privacy advocates have about biometrics? Do you agree or disagree with the concerns? Please explain.


2. Using the Internet and other sources, research the topic of biometrics. What type of biometrics is the most accurate? The lease accurate? Are specific biometric devices more realistic than others?

Thoroughly answer the following questions; 1. Discuss which biometrics method provides the best security while minimizing the potential of violating the user’s privacy rights. 2. Describe the differences between authentication and privacy and what mech

Thoroughly answer the following questions;

1. Discuss which biometrics method provides the best security while minimizing the potential of violating the user's privacy rights.


2. Describe the differences between authentication and privacy and what mechanisms WLANs can use to ensure both.


3. Compare how 802.11a works and list the advantages and disadvantages of 802.11a over 802.11g. Because ACS is a technical group, the list should have a high level of technical detail.

Risk Management framework

pply RMF on the software product of a hypothetical company. The textbook page 48 to page 70 shows an example how RMF is applied to KillerAppCos iWare 1.0 server product. This is a team project. Your team will hypothesize a company and a product of the company. Plant a few reasonable technical risks. It could be based on your past software development experiences, could be based on a software you have built, or some open source or commercial software application.
This project will be done as three person teams. Each member is an analyst. One member also plays the role of a manager and another one also plays the role of a software developer/tester.
Stage 1 Understand Business Context
o Have a discussion as a group on the name/nature of the software product and the company.
o Analyst extracts business goals, priorities (at least 3 goals)
o Analyst summarizes the system in text or diagram
o Analyst determine any technical, management, and operational controls that the p

Homework

Here is the midterm exam.  Write 3 or 4 good paragraphs for each questions with references for each individual question listed with the paragraphs for that question.

Answer the following 5 questions in essay format (should be about a page for each question) and provide references using APA format.



1) Could a business use information technology to increase switching costs and lock in its customers and suppliers?  Use business examples based on cloud computing to support your answers.



2) What are several major business benefits and concerns that organizations can realize by connecting all of their employees with wireless mobile devices?  How should the firm handle the security issues?



3) CRM and CRM powered by AI raises issues of invasion of privacy since conclusions can be drawn about a customer's behavior from the data commonly collected.  Discuss the potential privacy issues.  How can an organization meet

Multiple anomaly detection

1.    Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases.
2.    With the ever-increasing use of web and social-media data, data scientists must often perform text mining. Define and describe text mining. Then, describe the available tools.
3.    With cameras becoming ubiquitous, more and more companies and agencies are leveraging image recognitionoften for security purposes. Discuss whether such applications pose privacy threats.

Practical Connection Paper

Provide a reflection of at least 750 words (or 3 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

NOTE: I have included the textbook and Table of Contents so you have an idea of the topics that were covered.

Introduction
Data
Exploring Data
Classification: Basic Concepts, Decision Trees, and Model Evaluation
Classification: Alternative Techniques
Association Analysis: Basic Concepts and Algorithms
Association Analysis: Advanced Concepts
Cluster Analysis: Basic Concepts and Algorithms
Cluster Analysis: Additional Issues and Algorithms
Anomaly Detection
Appendices
Linear Algebra
Dimensionality Reduction: PCA, SVD, and More
Probability and